Home Store Project Ideas Project Guide Ask An Expert Blog Careers Teachers Parents Students
Create Assignment

How Secure Are Your Security Questions?

Difficulty
Time Required Average (6-10 days)
Prerequisites None
Material Availability Readily available
Cost Very Low (under $20)
Safety No issues

Abstract

Many websites ask you to answer "security questions," like "What is your mother's maiden name?," to recover your account if you ever forget your password or login ID. However, sometimes the answers to those questions are easy to find online. Does this pose a risk to the security of important accounts like email and online banking? Are people even aware that this information about them is available online? In this project, you will investigate how secure people think security questions are, and compare that to the reality of how easily you can find answers to these questions online.

Objective

Determine whether you can look up publicly available information about a person online, to find answers to common account security questions.

Credits

Ben Finio, PhD, Science Buddies

Cite This Page

MLA Style

Finio, Ben. "How Secure Are Your Security Questions?" Science Buddies. Science Buddies, 15 Sep. 2017. Web. 21 Sep. 2017 <https://www.sciencebuddies.org/science-fair-projects/project-ideas/Cyber_p007/cybersecurity/security-questions>

APA Style

Finio, B. (2017, September 15). How Secure Are Your Security Questions?. Retrieved September 21, 2017 from https://www.sciencebuddies.org/science-fair-projects/project-ideas/Cyber_p007/cybersecurity/security-questions

Share your story with Science Buddies!

I did this project I Did This Project! Please log in and let us know how things went.


Last edit date: 2017-09-15

Introduction

Have you ever forgotten a password? How many do you have? You have probably heard that you should avoid easily-guessed things like "password" or "123456" for your passwords, and that you should use a different password for every website, social media, gaming, school, or other online account you have. That is a lot of passwords to remember! Inevitably, sometimes people will forget passwords and need a way to authenticate, or verify, their identity in order to get back into their accounts. Some websites let you do this by answering a series of security questions, questions that ask about personal information that supposedly only you should know. If you can correctly answer all of the questions, then the website assumes it is really you and not someone impersonating you, and will restore access to your account.

However, many questions might be simple for someone else to answer. What is your mother's maiden name? What was your first pet's name? What is your favorite band? Your close friends and family might be able to answer those questions easily. Even someone who does not know you at all might be able to easily guess or find the answers to the questions. They could try a common answer like "pizza" or "ice cream" for "What is your favorite food?," check out your profile on social media sites like Facebook to find out what city you were born in, and use Google to look up public government records or a family tree website to find your parents' names. This would allow them to go to a website (like your email or social media account), click the "I forgot my password" link, and then answer the security questions to gain control of your account. The results of getting hacked can range from embarrassing (someone could view or share your personal emails or pictures) to causing financial loss (adults can have their credit card numbers or bank account information stolen).

So, it turns out that picking good security questions—and answers—is just as important as picking a good password. A strong password does not do you much good if someone can easily figure out all the answers to your security questions, but many people might not give these much thought. They might just pick a few that they know will be easier to remember, or they might not be aware of how much information is available about them online. In this project, you will survey people to find out if they think the answers to some common security questions about them are publicly available online, then try to find the answers yourself. Do you think people will be surprised by the results?

Terms and Concepts

  • Authenticate
  • Security question
  • Hacked
  • White hat
  • Black hat

Questions

  • Do you use any websites that use security questions to authenticate your account? If so, what are some of the questions? How hard do you think it would be for someone to guess or look up the answers to your questions?
  • What type of information do you post about yourself online (for example, social media profiles)? How much control do you have over this information and who can see it?
  • Is there any information about you online that you do not have direct control over? For example, does your name appear on a school or sports team website, or in a news article?
  • What types of information might be available about other people online? For example, adults might have public documents or government records that kids would not have, like a marriage license or the deed to a house.
  • Do you think people are aware of how much information is publicly available about them online?

Bibliography

This article gives a general overview of the problems with security questions:

This study by Google reports the effectiveness of security questions (referred to as "personal knowledge questions"). Even if you do not understand the entire report, it will be helpful if you read the abstract and sections 1 and 2.

This report is a very detailed survey about social media use by teenagers. Part 2 discusses what type of information teens post about themselves online and the privacy settings they use.

News Feed on This Topic

 
, ,
Note: A computerized matching algorithm suggests the above articles. It's not as smart as you are, and it may occasionally give humorous, ridiculous, or even annoying results! Learn more about the News Feed

Materials and Equipment

  • Internet access
  • Study volunteers (at least 10). See this page about sample size and margin of error for projects involving surveys.

Remember Your Display Board Supplies

ArtSkills sparkle letters

Holographic Poster Letters

ArtSkills buy now button
ArtSkills vinyl letters

Vinyl Letters & Numbers

ArtSkills buy now button
ArtSkills supplies trifold

ArtSkills Trifold with Header

ArtSkills buy now button

Share your story with Science Buddies!

I did this project I Did This Project! Please log in and let us know how things went.

Experimental Procedure

Working with Human Test Subjects

There are special considerations when designing an experiment involving human subjects. Fairs affiliated with Intel International Science and Engineering Fair (ISEF) often require an Informed Consent Form (permission sheet) for every participant who is questioned. Consult the rules and regulations of the science fair that you are entering, prior to performing experiments or surveys. Please refer to the Science Buddies documents Projects Involving Human Subjects and Scientific Review Committee for additional important requirements. If you are working with minors, you must get advance permission from the children's parents or guardians (and teachers if you are performing the test while they are in school) to make sure that it is all right for the children to participate in the science fair project. Here are suggested guidelines for obtaining permission for working with minors:

  1. Write a clear description of your science fair project, what you are studying, and what you hope to learn. Include how the child will be tested. Include a paragraph where you get a parent's or guardian's and/or teacher's signature.
  2. Print out as many copies as you need for each child you will be surveying.
  3. Pass out the permission sheet to the children or to the teachers of the children to give to the parents. You must have permission for all the children in order to be able to use them as test subjects.
Cybersecurity Project Warning

Cybersecurity projects can be fun, but they can also get you in trouble if you are not careful. Make sure you follow these rules when doing a cybersecurity project:

  • Do not attack any individual, computer, system, or network without consent from the individual (or person who owns the computer). For example, do not try to guess someone's email password and log into their account unless you get their permission first, or try to hack into a website without permission from the owner of the website.
  • Even if you have consent to perform an attack, the attack should be for learning purposes only, and you should help the individual or organization fix any problems you find (this is known as "white hat" hacking). For example, if you are able to guess someone's password, you should tell them they need to pick a stronger password (and help them learn how). Do not read their emails, change any of their account settings, look at private information or files like pictures, or tell anyone else their password.
  • If your project involves human subjects, even if you have their consent, you may still need approval from your science fair or an Institutional Review Board (similar to the rules for psychology or medical experiments). See this page for more information.
  • Do not pretend to be a different person, company, or other organization online. This includes pretending to be someone else on a social media site, setting up fake websites designed to look like real websites from reputable companies, or sending "phishing" or other emails designed to look like they were sent by someone else. (A controlled experiment where only study participants have access to examples of such websites or emails would be OK.)
  • Do not use data that was illegally obtained (for example, contact information stolen from a company's employee database), even if it was stolen by someone else and already posted online.
  • Do not publicly post sensitive personal information, even if it was obtained with consent. For example, if your project involves accessing people's contact information (legally), do not post someone's name and address in the "Results" section of your science fair display board. You should destroy any such information (by shredding paper or deleting files) when you are done with your project.
  • Do not install or run any malicious software (viruses, malware, spyware, trojans, etc.) on a computer that is connected to the internet. The software could easily spread to other computers and get out of your control.

If you have any doubts or questions about your project, check with your teacher or science fair administrator before you start.

  1. Gather volunteers for your project and get their consent to participate in a cybersecurity study. Your school or science fair may have specific rules you need to follow to obtain consent for an experiment with human subjects (see warnings at beginning of procedure). If not, you will need to design your own consent form using these guidelines. Ask your teacher for help if you are not sure how to do this.
    1. Your form should explain that you will attempt to look up answers to common website security questions, using information that is publicly available about the person online. You will not attempt to break in to any of their private online accounts (email, social media, etc.).
    2. You will ask participants to confirm if the answers you found are correct. They can choose not to answer if they are not comfortable doing so.
    3. You will not collect or look up any current contact information (like phone number or home address), or information that might give away their real name (like an email address).
    4. Data will be stored in an anonymous format. Participants' real names will not be connected to any of the information you find online, or their answers to questions about whether they expected that information to be available.
    5. Even though it is anonymized, data you collect on each individual will be destroyed after the project is complete. Aggregate data (totals for all participants in the study) will be preserved.
  2. Create a master list of your participants' names and anonymous ID numbers. You will destroy this piece of paper after you finish collecting data.
  3. Create or look up a list of 10 security questions.
    1. The questions should be about things that people would typically not hesitate to reveal in normal conversation. Do not ask for contact, financial, or otherwise confidential information (for example, do not ask for credit card numbers, social security numbers, current phone numbers, home address, or email address).
    2. Do a web search or look up the questions on some of the websites you use regularly if you need ideas.
    3. Note that questions may need to be different depending on whether you have recruited kids, adults, or both for your study. For example, questions like "Where did you get married?" or "What was the model of your first car?" may only work for adults.
  4. Design a survey form like the one shown in Table 1. You can make up or look up your own security questions; you do not need to use the examples in the table.
    1. Important: remember that you should not write the participants' names on the survey forms. Only write the anonymous ID numbers on the forms.
Participant ID number:
Security Question Answer you
found online
      Source       Does the volunteer think
this answer is available
online? (yes/no)
Is the answer
you found
correct?
What is your mother's maiden name?    
In what city was your father born?     
What was your first pet's name?     
What was your middle school's mascot?     
What is your favorite band?     
...     
Table 1. Example survey form.
  1. Try to look up the correct answer to each question for each participant online.
    1. You will need to use the participant's real name when searching for answers to the questions. Use your master list of names and ID numbers to look up real names when you need them, but remember not to write the real names on the survey forms.
    2. You can look up the answers in a variety of ways:
      1. Through a Google search, by browsing social media profiles, family tree websites, or news articles about the person.
      2. Look up public government records like birth certificates and marriage licenses.
      3. Make sure you try the same approach for each person, so your methods are consistent and reproducible (and you can describe them in the procedure of your science fair project).
      4. Avoid the temptation to "just Google it" and look at the first few results. Some sources of information, like individual social media posts or government records, might not appear very high in search results. You might need to go to a specific website (like a family tree site or a county government site) and search there.
      5. Different sources may be better than others for certain questions.
    3. Important: your goal is to find out what information is public about someone online. You may have access to extra (non-public) information if you are friends with someone on a social media site like Facebook. Before you start searching, you should log out of all social media sites, or use a web browser in private browsing mode. That will ensure that you only see public results.
    4. Record the answer you found and the source (copy the link if possible, or write down the name of the website) on the survey form for each participant. If you could not find an answer, specify that you could not find it.
  2. Interview each volunteer.
    1. For each question, ask the volunteer whether they think that information about them is publicly available online (meaning, can anyone—even someone they do not know in real life and are not friends with on social media—look up that information?).
    2. Inform the volunteer whether or not you found an answer. If you found an answer, tell the volunteer what you found (and where you found it) and ask if the information is correct (a yes/no answer is sufficient; they do not have to provide you with the correct answer if the answer you found is wrong).
    3. Record all results on your survey form for that volunteer.
    4. If the volunteer seems surprised or upset that certain information was publicly available online, discuss steps they could take to make that information private (for example, deleting a social media post or making a profile private). This is similar to the role that cybersecurity professionals play in the real world. Instead of using the information they discover for criminal purposes (known as "black hat" hacking), they report any vulnerabilities they find, and teach customers how to manage their own online privacy and security ("white hat" hacking).
  3. When you are done conducting all your interviews, shred your master list that matches names to ID numbers. This will ensure that your data remain anonymous for the rest of the project.
  4. Analyze your data.
    1. For each question:
      1. Tally up the results for all volunteers and fill out a table like Table 2. This table divides the volunteers into four categories:
        • People who thought the answer would be online, and the answer was online.
        • People who thought the answer would be online, and the answer was not online.
        • People who thought the answer would not be online, and the answer was online.
        • People who thought the answer would not be online, and the answer was not online.
      2. Make a bar graph of the four categories. Which of the four groups do you think faces the biggest security risk?
      3. Calculate the percentage of volunteers for whom you were able to find a correct answer online.
    2. Rank your questions from least secure (highest percentage of correct answers found) to most secure (lowest percentage) and make a bar graph of the results.
    3. Which question(s) had the biggest disparity between expectation and reality? Was there a question where most people thought the information would not be available online, but it actually was, or vice versa?
    4. Pretend that each study participant has an account with a website that uses the three least secure questions, and gave you one try to get the correct answer. If you were a hacker, what percentage of their accounts would you have been able to compromise (meaning, for how many could you get all three questions correct)?
    5. Repeat step d for the three most secure questions.
Question: Information actually available
Yes No
Thought information would be available Yes      
No      
Table 2. Example data table to tally the results for each question.
  1. Draw conclusions from your results.
    1. Do you think security questions are a secure way to recover an online account?
    2. Do you think websites should continue to use them, or switch to other methods for account recovery?
    3. Do you think the way a user chooses security questions and answers makes a difference?
  2. Important: as described in the Cybersecurity Project Warning, you must be careful how you handle data for this project, in order to protect the privacy of your volunteers.
    1. Make sure you shred the paper that links names and ID numbers. This will ensure that answers to specific security questions cannot be linked to one individual.
    2. Do not post copies of Table 1 on your science fair display board. Even though it does not list a real name, people may be able to guess the volunteer's identity based on their answers to the questions (for example, your friends might be able to guess each other's identities based on their favorite songs).
    3. It is OK to post Table 2 and the bar graphs described in step 8 on your display board, since those only show aggregate data (tallied for all volunteers) and not individually identifiable information.
    4. When you are completely done with your project, and you are sure you are done analyzing your data, you should shred all copies of Table 1. Check out the variations section before you do this, in case you would like to do any additional analysis of your data.

Communicating Your Results: Start Planning Your Display Board

Create an award-winning display board with tips and design ideas from the experts at ArtSkills.
ArtSkills button poster gallery 350
ArtSkills button design tips 350
ArtSkills button for more tips 210 h

Share your story with Science Buddies!

I did this project I Did This Project! Please log in and let us know how things went.


Variations

  • There are many other aspects of security questions you can study. Read the publication by Google in the bibliography for some ideas. Here are just a few:
    • Do people remember the answers to their own questions? Have participants give you their answers, and then ask them to recall the answers one day, one week, and one month later.
    • How easy is it to guess correct answers to questions, even without searching online? For example, how often can you correctly guess someone's favorite TV show just by picking a show you know is popular with people their age? Did any of your volunteers have the same answers for some questions? Many websites will give you multiple tries to enter a correct answer, so how much easier is it to guess their answers if you get three guesses?
    • How easily can friends, family members, or other acquaintances answer someone's security questions without looking online? Does this create vulnerabilities (for example, to a disgruntled coworker or a former friend)?
    • How often do people give fake answers to security questions? Does doing this make the answers easier or harder to remember? Does it make them more or less secure?
  • Instead of asking participants to answer yes/no to whether they think information will be available online, ask them to rate the likelihood that the information will be available on a 0–5 scale; or, ask them to rank your list of questions from easiest to hardest to answer. How well do their expectations match up with your results?
  • Some websites have moved away from security questions toward other methods for account recovery. For example, they might send a one-time recovery code to you via text message or email, or let you identify several real-world friends on a social network who can help confirm your identity if your account gets hacked. How secure are these methods relative to security questions? For example, do they still work if you lose your phone?

Share your story with Science Buddies!

I did this project I Did This Project! Please log in and let us know how things went.

Ask an Expert

The Ask an Expert Forum is intended to be a place where students can go to find answers to science questions that they have been unable to find using other resources. If you have specific questions about your science fair project or science fair, our team of volunteer scientists can help. Our Experts won't do the work for you, but they will make suggestions, offer guidance, and help you troubleshoot.

Ask an Expert

Related Links

If you like this project, you might enjoy exploring these related careers:

Woman checking for security holes in code

Information Security Analyst

Have you ever seen a story on the news about how a company or government agency was "hacked" and people's personal information, like names, addresses, or credit card numbers, was stolen? It is an information security analyst's job to prevent that from happening. Organizations hire information security analysts to analyze possible threats against their computer systems, which can range from malicious hackers trying to steal data to careless employees who accidentally forget to log out of a computer. They then make plans to prevent these threats and to deal with them when they arise. This is an exciting career for those who want to keep up with the constantly changing world of computers and the Internet. Read more
Woman checking for security holes in code/

Penetration Tester

In movies and in the media, computer hackers are often portrayed as the bad guys—criminals who steal money or important information. What if you could be a good hacker? Somebody whose job is to find security flaws in computer systems; but rather than exploiting them for personal gain, you help fix the problems before criminals can find them? That is what penetration testers—also called "white hat" or "ethical" hackers—do. Companies pay them to intentionally try to break into their systems to expose vulnerabilities. It is a bit like paying somebody to try and break into your house so you can fix a broken lock or loose window if they find their way inside. If you have always dreamed of being a hacker, but do not want to break the law, this could be the career for you! Read more
career cryptographer

Cryptographer

Cryptographers, also called cryptologists and cryptanalysts, develop the encryption algorithms that keep our modern online transactions, like emails and credit card purchases, safe from prying eyes. Even if information or a message is stolen, as long as it is encrypted, the person who stole it cannot read it! Cryptographers also work to test and break these algorithms, to check them for weaknesses and vulnerabilities. They even analyze and decipher codes used by terrorists and foreign governments, to provide valuable information to the U.S. military and intelligence agencies. Read more
cybersecurity security incident responder

Security Incident Responder

Security incident responders, also called intrusion analysts or incident response engineers, are like the "firefighters" of the cyber world. Companies can take steps to safeguard their computer networks and systems, but sometimes prevention is not enough and cyber attacks still happen. Sensitive data like customer credit card information can be stolen, entire websites could be brought down or altered, or personal contact information can be leaked. When this happens, incident responders must act quickly to find the source of the attack and shut it down. They will also analyze how the attack happened, determine the scope of the damage, and how to prevent it from happening again. Read more

News Feed on This Topic

 
, ,
Note: A computerized matching algorithm suggests the above articles. It's not as smart as you are, and it may occasionally give humorous, ridiculous, or even annoying results! Learn more about the News Feed

Looking for more science fun?

Try one of our science activities for quick, anytime science explorations. The perfect thing to liven up a rainy day, school vacation, or moment of boredom.

Find an Activity